Topic
Digital forensics
About: Digital forensics is a research topic. Over the lifetime, 4270 publications have been published within this topic receiving 49676 citations. The topic is also known as: digital forensic science & Digital forensics.
Papers published on a yearly basis
Papers
More filters
•
27 Jul 2014TL;DR: A framework based on literature and risk analysis techniques that organisations may apply when they want to migrate to the cloud to select a CSP that can provide an organisation with a digital forensic readiness cloud solution.
Abstract: In the digital age, organisations tend to invest large sums of their finances into technology because of the demand from business to handle their data efficiently. As these organisations grow, ubiquitous systems are required to securely store their big data. Cloud computing has emerged as a solution to this demand for a reliable and cost effective alternative to organisations. However, some organisations are skeptical about cloud computing as an ideal solution because of its pronounced susceptibility of privacy, data leakage and cyber-attacks through virtual networks. Hence, it is pivotal for organisations to have a certain level of confidence in the Cloud Service Provider (CSP) that they select as their cloud vendor. Digital forensic readiness is one of the metrics that organisations can use to measure the CSPs' ability to thwart cyber-crimes. This paper proposes a framework based on literature and risk analysis techniques that organisations may apply when they want to migrate to the cloud. The proposed framework is a process tool to select a CSP that can provide an organisation with a digital forensic readiness cloud solution.
13 citations
••
21 Oct 2020TL;DR: In this article, the authors deal with sources, classification, characteristics and uses of digital information in vehicles for forensic purposes from various perspectives, such as the behavior of a vehicle and its crew before, during and after an accident or other incident or security event under investigation.
Abstract: Modern vehicles are equipped with a large number of electronic devices. These devices generate, transmit, process and store digital data. Human transformation from digital data creates digital information that can be used for many purposes. Thus, forensic experts, security experts, police officers and investigators can use this information to clarify a traffic accident, the behavior of a vehicle and its crew before, during and after an accident or other incident or security event under investigation. Invehicle data is stored in different devices, in different data formats, and is generally not internationally standardized. Similarly, some tools for analyzing this data for forensic purposes within the European Union are not standardized. These facts make it difficult to use digital data and information obtained from it for forensic purposes. The paper deals with sources, classification, characteristics and uses of digital information in vehicles for forensic purposes from various perspectives.
13 citations
••
01 Sep 2008
TL;DR: Evidence that examiners have available to them, the artifacts left behind by installation and use of the Limewire client that will tell them what the user did and their intent behind that use and a tool that will allow the investigator to extract all the evidence and expand the investigation into the child pornography networks the suspect was a member of are introduced.
Abstract: In the world of information sharing Limewire is one of the more popular means for exchanging illicit material and therefore often features in child pornography (CP) cases. In this paper we look at evidence that examiners have available to them, the artifacts left behind by installation and use of the Limewire client that will tell them what the user did and their intent behind that use. We will also look at tips and techniques for finding and extracting evidence from unallocated space, slack space and other corners of the digital evidence. Lastly we introduce a tool AScan that will allow the investigator to extract all the evidence and expand the investigation into the child pornography networks the suspect was a member of.
13 citations
•
TL;DR: In this paper, the authors describe several statistical techniques for detecting traces of digital tampering in the absence of any digital watermark or signature, and devise detection schemes to reveal these correlations.
Abstract: A digitally altered photograph, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic photograph. As a result, photographs no longer hold the unique stature as a definitive recording of events. We describe several statistical techniques for detecting traces of digital tampering in the absence of any digital watermark or signature. In particular, we quantify statistical correlations that result from specific forms of digital tampering, and devise detection schemes to reveal these correlations.
13 citations